SecWiki周刊(第2期)
2014/03/10-2014/03/16
      安全资讯
    
Clarifying the Origins of FireEye
http://www.fireeye.com/blog/corporate/2014/03/clarifying-the-origins-of-fireeye.html
http://www.fireeye.com/blog/corporate/2014/03/clarifying-the-origins-of-fireeye.html
NSA部署自动化项目:可根据QQ飞信锁定监控目标
http://www.youxia.org/snowden-nsa-turbine-feixin-qq.html
http://www.youxia.org/snowden-nsa-turbine-feixin-qq.html
网络安全威胁周报——第201410期 
http://drops.wooyun.org/news/1034
http://drops.wooyun.org/news/1034
      安全技术
    
2014年最新国内外信息安全厂家及安全产品分类
http://www.srxh1314.com/2014-security-compan-final.html
http://www.srxh1314.com/2014-security-compan-final.html
端口攻击之873端口rsync默认口令漏洞
http://www.91ri.org/8406.html
http://www.91ri.org/8406.html
个性DIY的PHPwebshell
http://x95.org/diy-php-shell-foreign.html
http://x95.org/diy-php-shell-foreign.html
极客范:Linux终端进程管理 – 10个你必须知道的命令
http://sec007.cc/1531.html
http://sec007.cc/1531.html
BCTF Write-up:他乡遇故知
http://www.freebuf.com/articles/others-articles/28244.html
http://www.freebuf.com/articles/others-articles/28244.html
Linux服务器的初步配置流程
http://www.ruanyifeng.com/blog/2014/03/server_setup.html
http://www.ruanyifeng.com/blog/2014/03/server_setup.html
构建故障分析平台采用python实现抓包分析数据包
http://rfyiamcool.blog.51cto.com/1030776/1374484
http://rfyiamcool.blog.51cto.com/1030776/1374484
Independent Study: Modern Windows Vulnerability Analysis & Exploit Development
http://security.cs.rpi.edu/~gaasem/winexp/IndependentStudy.pdf
http://security.cs.rpi.edu/~gaasem/winexp/IndependentStudy.pdf
64bit OSX hacking with Metasploit
http://astr0baby.wordpress.com/2014/03/14/64bit-osx-hacking-with-metasploit/
http://astr0baby.wordpress.com/2014/03/14/64bit-osx-hacking-with-metasploit/
解密MSSQL链接数据库的密码
http://drops.wooyun.org/tips/1067
http://drops.wooyun.org/tips/1067
网络安全威胁周报——第201410期 
http://drops.wooyun.org/news/1034
http://drops.wooyun.org/news/1034
Pass-the-Hash: How Attackers Spread and  How to Stop Them
http://www.rsaconference.com/writable/presentations/file_upload/hta-w03-pass-the-hash-how-attackers-spread-and-how-to-stop-them.pdf
http://www.rsaconference.com/writable/presentations/file_upload/hta-w03-pass-the-hash-how-attackers-spread-and-how-to-stop-them.pdf
Post-Snowden Forensics
http://forensicmethods.com/snowden-forensics
http://forensicmethods.com/snowden-forensics
NSA部署自动化项目:可根据QQ飞信锁定监控目标
http://www.youxia.org/snowden-nsa-turbine-feixin-qq.html
http://www.youxia.org/snowden-nsa-turbine-feixin-qq.html
Clarifying the Origins of FireEye
http://www.fireeye.com/blog/corporate/2014/03/clarifying-the-origins-of-fireeye.html
http://www.fireeye.com/blog/corporate/2014/03/clarifying-the-origins-of-fireeye.html
BCTF Write-up 2
http://ppwwyyxx.com/2014/BCTF-writeup/
http://ppwwyyxx.com/2014/BCTF-writeup/
Exploiting privacy: Surveillance companies pushing zero-day exploits
https://www.privacyinternational.org/blog/exploiting-privacy-surveillance-companies-pushing-zero-day-exploits
https://www.privacyinternational.org/blog/exploiting-privacy-surveillance-companies-pushing-zero-day-exploits
Learn Pentesting Online
http://www.pentesteracademy.com/topics
http://www.pentesteracademy.com/topics
lusca:Application security for express apps
https://github.com/PayPal/lusca
https://github.com/PayPal/lusca
STRUTS2的getClassLoader漏洞利用
http://drops.wooyun.org/papers/1151
http://drops.wooyun.org/papers/1151
PatchDroid: Scalable Third-Party Security Patches for Android Devices
http://www.mulliner.org/collin/academic/publications/patchdroid.pdf
http://www.mulliner.org/collin/academic/publications/patchdroid.pdf
X-Ray for Android
http://www.xray.io/
http://www.xray.io/
深夜调试某浏览器堆损坏的小记录
http://drops.wooyun.org/papers/1026
http://drops.wooyun.org/papers/1026
Pwn2Own 2014: The lineup
http://www.pwn2own.com/2014/03/pwn2own-2014-lineup/
http://www.pwn2own.com/2014/03/pwn2own-2014-lineup/
2014工业控制系统的安全研究与实践
http://www.nsfocus.com/report/NSFOCUS_ICS_Security_Report_20140311.pdf
http://www.nsfocus.com/report/NSFOCUS_ICS_Security_Report_20140311.pdf
趋势科技2月移动客户端病毒报告
http://blog.csdn.net/iqushi/article/details/21019119
http://blog.csdn.net/iqushi/article/details/21019119
Revisiting iOS Kernel (In)Security: Attacking the Early Random PRNG
http://mista.nu/research/early_random-slides.pdf
http://mista.nu/research/early_random-slides.pdf
知道创宇研发技能表v2.2 
http://blog.knownsec.com/Knownsec_RD_Checklist/v2.2.html
http://blog.knownsec.com/Knownsec_RD_Checklist/v2.2.html
Linux下的常见错误配置
http://www.freebuf.com/articles/system/27982.html
http://www.freebuf.com/articles/system/27982.html
SOAP: The Home Automation Router And Kickstarter Scam
http://hackaday.com/2014/03/07/soap-the-home-automation-router-and-kickstarter-scam/
http://hackaday.com/2014/03/07/soap-the-home-automation-router-and-kickstarter-scam/
The Browser Hacker's Handbook
http://vdisk.weibo.com/s/GQfAKMM4ASbK
http://vdisk.weibo.com/s/GQfAKMM4ASbK
BCTF Writeup
http://drops.wooyun.org/papers/1071
http://drops.wooyun.org/papers/1071
php is_numberic函数安全吗
http://www.leesec.com/archives/313
http://www.leesec.com/archives/313
The Future is Now: Car Hacking
http://resources.infosecinstitute.com/future-now-car-hacking/
http://resources.infosecinstitute.com/future-now-car-hacking/
BCTF write_up
http://icefishwp.sinaapp.com/?p=484
http://icefishwp.sinaapp.com/?p=484
Pipal:Password Analyser
http://www.digininja.org/projects/pipal.php
http://www.digininja.org/projects/pipal.php
header的安全配置指南
http://drops.wooyun.org/tips/1166
http://drops.wooyun.org/tips/1166
WordPress XML-RPC PingBack Vulnerability Analysis
http://blog.spiderlabs.com/2014/03/wordpress-xml-rpc-pingback-vulnerability-analysis.html
http://blog.spiderlabs.com/2014/03/wordpress-xml-rpc-pingback-vulnerability-analysis.html
Fluent 2014 Speaker Slides Video
http://fluentconf.com/fluent2014/public/schedule/proceedings
http://fluentconf.com/fluent2014/public/schedule/proceedings
Pandemonium: Nation States, National Security, and the Internet
https://www.ccdcoe.org/publications/TP_Vol1No1_Geers.pdf
https://www.ccdcoe.org/publications/TP_Vol1No1_Geers.pdf
CVE-2014-0301 Analysis
http://blog.carterjones.info/posts/2014/03/14/cve-2014-0301-analysis
http://blog.carterjones.info/posts/2014/03/14/cve-2014-0301-analysis
云计算加速可穿戴设备落地文档
http://vdisk.weibo.com/s/BRdF1FcjqjGq4/1394523053
http://vdisk.weibo.com/s/BRdF1FcjqjGq4/1394523053
《安全参考》201403-15
http://pan.baidu.com/s/1jGuntJK
http://pan.baidu.com/s/1jGuntJK
meterpreter初探
http://www.coolhacker.org/?p=1563
http://www.coolhacker.org/?p=1563
Theoretical Methodology for Detecting ICMP Reflected Attacks: SMURF Attacks
http://resources.infosecinstitute.com/theoretical-methodology-detecting-icmp-reflected-attacks-smurf-attacks/
http://resources.infosecinstitute.com/theoretical-methodology-detecting-icmp-reflected-attacks-smurf-attacks/
Python高级编程技巧
http://blog.jobbole.com/61171/
http://blog.jobbole.com/61171/
BugsCollector 
http://bugscollector.com
http://bugscollector.com
WiFI APT - File transfer with Wireless exfiltration protocol
http://www.youtube.com/watch?v=4nCoVhryang
http://www.youtube.com/watch?v=4nCoVhryang
f-secure:Threat Report covering the second half of 2013
http://www.f-secure.com/static/doc/labs_global/Research/Threat_Report_H2_2013.pdf
http://www.f-secure.com/static/doc/labs_global/Research/Threat_Report_H2_2013.pdf
安全扫描工具Nmap引擎理解文档
http://www.freebuf.com/articles/system/28408.html
http://www.freebuf.com/articles/system/28408.html
Analysis of, Malware from the MtGox leak archive
http://www.securelist.com/en/blog/8196/Analysis_of_Malware_from_the_MtGox_leak_archive
http://www.securelist.com/en/blog/8196/Analysis_of_Malware_from_the_MtGox_leak_archive
使用OpenSSH证书认证
http://drops.wooyun.org/tips/1055
http://drops.wooyun.org/tips/1055
 Leveraging Threat Intelligence in Security Monitoring
https://securosis.com/assets/library/reports/Securosis_ThreatIntelSecurityMonitoring_FINAL.pdf
https://securosis.com/assets/library/reports/Securosis_ThreatIntelSecurityMonitoring_FINAL.pdf
Learn regular expressions in about 55 minutes
http://qntm.org/files/re/re.html
http://qntm.org/files/re/re.html
droidsec:Android Whitepapers
https://github.com/droidsec/droidsec.github.io/wiki/Android-Whitepapers
https://github.com/droidsec/droidsec.github.io/wiki/Android-Whitepapers
MySQL 到 MongoDB 的迁移 
http://danqingdani.blog.163.com/blog/static/1860941952014214112153146
http://danqingdani.blog.163.com/blog/static/1860941952014214112153146
Steal WhatsApp database (PoC) 
http://bas.bosschert.nl/steal-whatsapp-database/
http://bas.bosschert.nl/steal-whatsapp-database/
黑帽(亚洲)大会议题汇总
http://blackbap.org/post/Blackhat_Asia
http://blackbap.org/post/Blackhat_Asia
      安全专题
    
一些Android资源
https://www.sec-wiki.com/topic/40
https://www.sec-wiki.com/topic/40
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com本期原文地址: SecWiki周刊(第2期)

 
					 
					 
					